February 17, 2026

Default

Only Dropped Once…

 

 

 

 

 



In the military sphere, there is a great deal of ribbing and catcalling, both between different services of a nation’s armed forces, but also between the forces of different countries. For the most part, this ribbing is good-natured fun, especially when it is based on actual reality.

However, there has been a highly toxic level of mocking applied to the armed forces of France, a situation that has been getting worse over the last forty years.

The jokes abound – the beret being designed to facilitate surrender by not getting in the way of raising one’s hands; the notion of French tanks having more reverse gears than forward one; the idea that French genes could not be improved after World War 1 because American troops widely used prophylactics; and the idea that French rifles are excellent as surplus…because they were “only dropped once“…something applied to the Army of South Vietnam, as well.

It’s one thing, to make these jokes in actual jest. It is another thing entirely, when they become statements. Then, it’s no longer funny, but suicidally insulting.

In fact, the French military has maintained a track record of success on the battlefield for centuries. The source of these juvenile statements of inability only date from the Franco-Prussian War, and its catastrophic cost to the country. The military’s troubles in World War 1 came from holding the Imperial German Army at bay for three years, at a cost of 1.4 million casualties.

While the disaster of the opening of World War 2 led to France’s conquest by Nazi Germany, France’s military plan was not a bad plan, just a plan poorly executed…and the British did not do very well, then, either. The collapse of France’s colonial empire after World War 2 did come from overly ambitious military plans formed by not understanding that colonial warfare had changed…something the United States also failed to grasp, in the exact same place as Dien Bien Phu, a decade prior.

The fact is that, for all of it’s messy problems in the last century, the French military remains one of the most capable armed forces on the planet – if their leaders allow their generals to do their jobs.

The French Army’s reputation for military professionalism, despite its dramatic fluctuations over the past two centuries, has created a complex narrative that defies simple description. From the revolutionary fervor of the Napoleonic era to the post-WW2 colonial campaigns and modern peacekeeping operations, France’s military has continually demonstrated both exceptional competence and notable – but recoverable – failures that continue to shape perceptions today.

The Napoleonic Foundation

The modern French Army’s professional identity was forged in the crucible of the Revolutionary and Napoleonic Wars (1792-1815). Napoleon’s Grande Armée established standards of tactical innovation, logistical organization, and battlefield leadership that influenced military thinking across Europe, down to today. The army’s meritocratic promotion system, revolutionary at the time, created a professional officer corps based on ability rather than aristocratic birth. This period saw the development of combined arms tactics, the corps system, and sophisticated staff work that demonstrated clear military professionalism.

Vive l’Empereur! Charge of the 4th Hussars at the battle of Friedland, 14 June 1807. 1891 painting by Édouard Detaille. Art Gallery of New South Wales. Public Domain.

 

However, even during this golden age, the French military exhibited characteristics that would later prove problematic. The cult of offensive action (offensive à outrance) and the emphasis on élan over methodical planning became deeply embedded in French military culture, later contributing to both spectacular victories and catastrophic defeats.

19th Century Trials and Adaptations

The Franco-Prussian War of 1870-71 exposed serious deficiencies in post-Napoleonic French military professionalism. Poor intelligence, inadequate logistics, and outdated tactical thinking led to decisive defeat and the collapse of the Second Empire. The subsequent creation of the Third Republic saw significant military reforms, including the establishment of improved staff colleges and the modernization of equipment and tactics.

The colonial period (1830s-1960s) presents a particularly complex chapter in French military professionalism. The conquest of Algeria, the expansion into West and Equatorial Africa, and campaigns in Indochina demonstrated considerable tactical adaptability and logistical capability over vast distances. French colonial forces also developed expertise in irregular warfare, cultural adaptation, and civil-military cooperation that proved valuable in diverse environments, although these advantages rarely translated into warfare on the European continent, which was common to all the major European powers.

Yet this same period saw the development of what critics term “colonial habits” – reliance on superior firepower against less-equipped opponents, acceptance of harsh methods, and a certain detachment from metropolitan oversight that would later create problems in conventional conflicts.

World War I: Staying Power

The Great War stretched French military professionalism to its limits. Initial disasters, including the failure of Plan XVII and massive casualties from adherence to offensive doctrine, gave way to remarkable adaptation under pressure. The French Army demonstrated institutional learning capacity, rapidly developing new tactics for trench warfare, integrating new technologies, and maintaining cohesion through four years of unprecedented carnage.

French infantry pushing through enemy barbed wire, 1915. Agence de presse Meurisse. Public Domain.

 

The performance of French commanders like Ferdinand Foch and Philippe Pétain, along with the army’s ability to absorb and integrate lessons from the battlefield, demonstrated core professional competencies. However, the trauma of the war also reinforced defensive thinking that would prove problematic in the next conflict.

1940: Collapse and Recovery

The defeat of 1940 represents perhaps the most significant challenge to claims of French military professionalism. Despite having numerically superior and often technically advanced equipment, the French Army was comprehensively outmaneuvered by German forces employing innovative combined arms tactics. Analysis reveals multiple professional failures: inadequate intelligence, poor communications, inflexible command structures, and outdated operational concepts.

Yet the same period saw examples of French military professionalism in different contexts. The Free French forces under Charles de Gaulle, though small, maintained military traditions and eventually contributed significantly to the liberation of France. The French Resistance, while not strictly military, demonstrated tactical innovation and operational security that impressed Allied observers.

Colonial Wars and Professional Dilemmas

The post-war colonial defeats in Indochina (1946-1954) and Algeria (1954-1962) present perhaps the most controversial chapters in assessing French military professionalism. In Indochina, French forces demonstrated remarkable tactical competence in difficult conditions, developing techniques counterinsurgency and showing considerable adaptability. However, strategic failures and political constraints ultimately led to defeat at Dien Bien Phu.

The Algerian War proved even more problematic. While French forces achieved significant tactical successes against the FLN, the conflict saw disturbing breakdowns in professional conduct, including widespread use of torture and involvement in attempted coups against the civilian government. The Battle of Algiers (1956-1957) exemplified this tension between tactical effectiveness and questionable methods.

Since 1962, the French Army has undergone a significant revamping of its professional nature. The end of conscription in 1996 created an all-volunteer force with higher educational standards and improved training. French forces have demonstrated competence in various international operations, from peacekeeping in the Balkans to counterterrorism operations in the Sahel region of Africa.

Operations like Serval (2013) and Barkhane (2014-2022) in Mali showcased French capabilities in rapid deployment, intelligence gathering, and coordination with international partners. These operations demonstrated institutional learning from previous colonial experiences while maintaining focus on legitimate military objectives.

And it is here, that a more detailed look at Operation Serval is instructive on just how adaptable French forces can be.

Strategic Challenges of Operation Serval (2013)

Operation Serval presented the French military with a complex array of strategic challenges that tested every aspect of modern expeditionary warfare capabilities. The intervention in the war in Mali, launched on January 11, 2013, required France to project power across 4,000 kilometers into the heart of the Sahel region under severe time constraints and with limited initial international support.

Geographical and Logistical Complexity

Mali’s vast territory — larger than France and Germany combined — posed immediate strategic challenges. The northern regions under jihadist control encompassed over 800,000 square kilometers of desert and semi-arid terrain with minimal infrastructure. French forces faced the fundamental problem of securing lines of communication across this enormous space while maintaining operational tempo against a mobile enemy well-adapted to the local environment.

The logistical challenge proved particularly acute given Mali’s landlocked position and limited transportation infrastructure. France had to establish supply chains through multiple African partners, primarily using bases in Ivory Coast, Chad, and Niger. The single major airfield at Bamako created a critical vulnerability, while the absence of reliable road networks forced heavy reliance on air transport for sustained operations. This logistical complexity demanded unprecedented coordination between French forces, African partners, and international allies.

Map of the conflict in Northern Mali, c.2013, by WikiUser Orionist. CCA/3.0.

 

Time Sensitivity and Strategic Surprise

Perhaps the most critical challenge was the compressed timeline. Intelligence indicated that jihadist forces were preparing to advance south toward Bamako, Mali’s capital, potentially within days of the French decision to intervene. This left no time for the deliberate planning and force buildup typical of major military operations. French planners had to balance the immediate need to halt jihadist momentum with the longer-term requirement to establish sustainable operations across northern Mali.

The rapid deployment requirement meant accepting significant strategic risks. Initial French forces numbered fewer than 1,000 troops — inadequate for controlling territory, but sufficient to provide a rapid response capability. This created a dangerous window where French forces operated with minimal reserves while still building combat power in theater.

Coalition Building Under Pressure

France faced the delicate challenge of building international legitimacy while maintaining operational flexibility. The African Union had authorized the African-led International Support Mission to Mali (AFISMA), but this force remained months from deployment. France needed to demonstrate that Serval was not another unilateral European intervention in Africa, while simultaneously retaining command authority essential for rapid operations.

The diplomatic challenge extended to securing overflight rights, basing agreements, and logistics support from multiple African and European partners. Each agreement required careful negotiation to balance French operational needs with partner nation sensitivities about sovereignty and post-colonial relationships.

French officer making contact with the population in southern Mali. 2016 photo by WikiUser TM1972. CCA/4.0 Int’l.

 

Enemy Adaptation and Asymmetric Threats

The jihadist coalition in northern Mali presented a sophisticated opponent that combined conventional capabilities with insurgent tactics. Groups like AQIM (Al-Qaeda in the Islamic Maghreb) had years to prepare defensive positions and supply caches across the region. They possessed advanced weaponry captured from Libyan stockpiles, including anti-aircraft systems that threatened French air operations.

More challenging was the enemy’s ability to blend into local populations and exploit grievances against the Malian government. French forces had to distinguish between ideological jihadists and local groups with legitimate political grievances, while avoiding civilian casualties that could undermine popular support for the intervention.

Strategic Success Despite Constraints

Despite these formidable challenges, Operation Serval achieved its strategic objectives within weeks. French forces halted jihadist advances, secured major population centers, and degraded enemy capabilities sufficiently to allow AFISMA deployment. The operation demonstrated sophisticated understanding of modern warfare’s political dimensions—achieving military objectives while building conditions for successful transition to international peacekeeping forces.

The strategic challenges of Serval illustrate the complexity of contemporary expeditionary operations and highlight the French military’s capacity for rapid, effective intervention in challenging operational environments. This success provides compelling evidence of institutional competence that deserves recognition in serious strategic analysis.

Contemporary Assessment

Today’s French Army exhibits many characteristics of a professional military force: clear command structures, standardized training, integration with NATO allies, and adherence to international laws of war. However, debates continue about the persistence of certain cultural traits from earlier periods, particularly regarding operations in former colonial territories.

The French military’s professional reputation ultimately rests on its demonstrated capacity for adaptation, institutional learning, and technical competence across diverse operational environments. While historical controversies remain, the modern force has largely addressed the systemic issues that plagued earlier generations, creating a military organization that generally meets contemporary standards of professionalism.

Conclusion

The French military faces challenges, to be sure. But other, larger forces – usually with highly inflated perceptions of their own ability – face whose same challenges, as all armed forces try to navigate the swirling tempest of the emerging “One-N-Twenty“.

Don’t write off an army because of some bumps over the course of several centuries: You make mistakes, too.

 

 

 

 

The Freedomist — Keeping Watch, So You Don’t Have To

 

The Ghost of Faustin Wirkus

 

 

 

 

 



It is a general article of faith in most armed forces around the world, that the enlisted soldier – meaning, that 18 to 22 year old kid brought into the military, because war is a young person’s game – need close supervision by a college-educated officer, so that the young soldier can be kept out of trouble. But, while young adults, far from home for the first time, getting into trouble is a given despite supervision, that is not the real reason.

The real reason the establishment and their commissioned officers, is that unless the enlisted troops are closely monitored, they will invariably “go off script”. Case in point: Faustin Wirkus

…Or, if you prefer, King Faustin II of La Gonâve, Haiti.

Born in about 1896, Faustin Wirkus was born into a Polish family in Rypin, Poland, then part of the Russian Empire. In around 1905, the family moved to the coal country in Dupont, Pennsylvania. After a few years working in the coal fields as a child, in 1915 Wirkus enlisted in the United States Marine Corps, and was soon deployed to the island of Haiti, rising to the rank of Gunnery Sergeant by 1920.

The United States had intervened in Haiti in 1915, following a wild series of uprisings that had resulted in the lynching death of the then-President Vilbrun Guillaume Sam, to – as always – “protect American interests”. The United States quickly established what amounted to a military dictatorship, administered by the US Marine Corps. Part of this administration involved recruiting a Gendarmerie that could be carefully trained as a kind of “lightweight military police”, to keep the island under control and to hunt down bandits and rebels.

U.S. Marines and guide in search of bandits. Haiti, circa 1919. Department of the Navy photo, 1919. Public Domain.

 

Haiti, unlike today, had a very credible military reputation. After throwing off the yoke of French colonial oppression in 1804, Port-au-Prince decided to flex its muscle as the Spanish Empire began to collapse, invading and conquering the neighboring Spanish colony of Santo Domingo (the modern Dominican Republic) in 1822. Haiti’s 20-odd year rule over Santo Domingo was so brutal, that February 27 is celebrated as the day Dominicans finally overthrew Haitian rule, and gained their independence.

Following this, Haiti began its downward spiral, resulting in the collapse in 1915, that led the United States to intervene.

Following his basic training, Faustin Wikus was deployed to the island in 1915 as part of the “Advanced Base Force“, and was assigned to the “Haitian Constabulary” (the formal name for the Gendarmerie) in 1918. The Gendarmerie’s first US commander was the legendary Smedley Butler, then a Major in the Marine Corps, making it no surprise that the Gendarmerie’s all-Black Shooting Team went on to take Olympic Bronze in the Men’s Free Rifle Team event at the 1924 Paris Olympics.

Wirkus, meanwhile, apparently fell in love with Haiti, and worked hard to try and help stabilize the country. Because of how the Gendarmerie was organized, many enlisted Marines were given commissions as officers in the Constabulary, leading small units of native Gendarmes.

It was in this capacity that Wirkus eventually arrived at La Gonâve Island, in 1926. While there is some conjecture – nearly one hundred years on, hampered be scanty records – Wirkus came into contact with a woman named Ti Memenne. Recognized locally as a “tribal queen”, which was a position not recognized by the nation’s republican government, she was apparently arrested for “trivial voodoo offences“, where it seems that she came into contact with Wirkus for the first time, with him aiding in her release from custody.

When Wirkus (apparently volunteering on his own in late-June or early-July of 1926) was sent to La Gonâve to assume command of the Constabulary unit there, he had apparently made such an impression on Queen Ti Memenne, that she convined her subjects that he was the reincarnation of Faustin Soloque, the first (and last) Emperor of the Second Empire of Haiti…and then convinced them to agree that Wirkus should be crowned as King Faustin II, Co-Monarch of La Gonâve in a Voodoo ceremony.

Queen Ti Memenne (L) and GySgt Faustin Wirkus (R), on La Gonâve Island, c.1927. Unknown USMC Photographer. Public Domain.

 

Well, then.

Wirkus went on to “rule” the island until 1929, when he was removed from the island and transffered back to the United States, proper. Apparently, Wirkus’ efficiency at ruling the island had cut too deeply into the corruption kickbacks Haitian politicians were extracting from the island. The United States government was only too happy to comply with this request, because the idea of a US enlisted man ruling as a “king” of a foreign island while still on active duty, was very unpopular…”alarming”, even.

Wirkus subsequently left the Marine Corps in 1931, and did a stint on the speaking circuit, giving talks about his time as the “White King of La Gonâve“. Then, with war looming again in 1939, Wirkus reenlisted in the Marine Corps, serving first as a recruiter, then as a gunnery instructor, eventually rising to the dual ranks of Warrant Officer [https://en.wikipedia.org/wiki/Warrant_officer] and Marine Gunner [https://en.wikipedia.org/wiki/Marine_gunner] for aviation gunnery.

Faustin Wirkus fell ill in January of 1945, and passed away on October 8th of that year. He was survived by his wife, Yula, and his son – Faustin, Jr. – who went on to serve in the Marine Corps as a helicopter pilot.

So. What does the story of Faustin Wirkus teach us?

Primarily, that enlisted troops – and especially Marines – are hyper unpredictable. Give them a clear goal, and they will do whatever is necessary to make it work.

Whatever. Is. Necessary.

And for the Establishment, that is not a good thing – after all, if some unlettered, uncouth enlisted critter can accomplish national goals with minimal supervision, why do their own high-society positions and privilege need to exist? I mean, how can their friends skim off the top of contracts, when some 25 year-old kid with a high school diploma, an attitude, a hangover and a coffee pot can do a better job, faster and more efficiently?

While the foregoing statement is rather “tongue in cheek”, it really isn’t, because it is very real – after all, how the hell can the Ivy League alumni expect to shave off hundreds of millions of dollars of money deducted from the troop’s pay to fund mess hall menus, leaving them eating lima beans and toast for “Thanksgiving Dinner”…assuming that the mess hall is even open? Because the $460 per month deducted from the troop’s pay to fund the mess halls on-post comes to $115 per week – I don’t know about you, but I can eat pretty well on $115 a week, including steak and shrimp…assuming that I can use a hot plate in the barracks – which on most bases, you can’t do.

Because you can eat at the mess hall. You know – dining on lima beans and toast.

And that’s LONG before we talk about telling troops to fix and repair their own barracks – It’s almost like there is little, if any, need for contracting with civilian companies to do anything beyond making weapons, ammunition and gear…and maybe uniforms. Maybe.

U.S. Marines with Headquarters and Service Battalion, 1st Marine Logistics Group, show Brig. Gen. Andrew M. Niebel, the commanding general of 1st MLG, how they patch holes in the barracks during Operation Clean Sweep at Camp Pendleton, California, Oct. 16, 2024. LCpl Deja Rogers, U.S. Marine Corps photo. Public Domain.

 

And this extends to security, because as the recent mass shooting at Fort Stewart, GA shows, troops trained to handle some of the most lethal weapons on the planet cannot be trusted to go about armed to protect themselves from either jilted lovers or, you know, terrorists.

And believe me when I say that this has been the norm on US military bases for decades.

Feel safe?

 

 

The Freedomist — Keeping Watch, So You Don’t Have To

 

A Puzzlement, Part 2.5 – The 7.62mm Mystery

 

 

 



This is not the typical article that I write, here. In an odd way, this is unusually personal…and I have no real idea why.

What started as a curious observation, eventually became something of an obsession. I knew that something was wrong about my observation, but I couldn’t put my finger on why it was wrong. Many might see this as an odd — possibly disturbing — example of OCD, but as you will see, while it is certainly “odd”, it is not irrational…Not least, because it is properly placed between two earlier articles here. It is connected to the two, but because it was so odd, it appears here as the third installment, instead of its proper place as the second article in the series.

It took that long for me to parse out what had happened. As to why it happened…well, we’ll get to that point.

Firearms are curious things, when it comes to weapons. If you look back through all verifiable human history, there are no mentions of “firearms”, as we understand the term — going back as far as c.50,000 years ago, to the oldest cave paintings and petroglyphs — before about the 8th Century AD (c.900 AD). Every other weapon that appears is a club, a spear, a bow and arrow, a sling, and the occasional jawbone of an ass. But, once gunpowder was invented, and someone realized that it was useful as a weapon in more than rockets, development began in earnest.

Over the centuries, lessons were learned, and weapons, projectiles and propellants were improved, sometimes slowly, sometimes at breakneck speeds…Until 1945.

In the aftermath of World War 2, there were something like thirteen “calibers” of military small arms in general use in the world. As the Cold War began to dawn, the Soviet Union — in the form of Russia — established a regimen of standardization in small arms ammunition, beginning with the 7.62x54mmR caliber for rifles and machine guns, and the 7.62x25mm “Tokarev” for handguns and submachine guns. This was not unusual — the 7.62mm as a basic bore diameter had been settled on by the Soviet’s predecessor, the Imperial Russia of the Romanov Dynasty.

(Note: When reading a weapon’s caliber in millimeters, the numbers at the beginning are the bullet’s diameter in millimeters; the number following the ‘x’ is the overall length of the cartridge, again in millimeters.)

But, before the Warsaw Pact was formally organized, the North Atlantic Treaty Organization (NATO) was formed in 1949. As a purely and openly military alliance, the NATO member states quickly decided that the alliance’s national militaries needed to standardize on a common caliber, even if they did not adopt the same small arms.

To describe caliber in brief, caliber is determined by the diameter of the barrel, but is also determined by the chamber — which holds the cartridge case — and the spiral grooves (“rifling“) that stabilizes the projectile as it moves down the barrel. It is this combination of features that determine the caliber of a firearm, and is the reason why you cannot “trade” ammunition between different weapons, without a great deal of serious machinist work.

But…The first, and most critical step in making a barrel is to punch a bore down the length of the “barrel blank” (the steel bar stock you are cutting the barrel from) at the precise diameter, because as the old rubric goes, you can take material away, but you cannot add it back. With this established, you can move on to rifling the bore, and reaming our the chamber for the (usually) brass cartridge case, forming the overall “cartridge“.

This is not an academic exercise, because in the world of military procurement, few decisions are made without extensive documentation, cost-benefit analysis, and strategic rationale, because the cartridge — the bullet, propellant and case — represents a colossal expenditure of money and infrastructure. For NATO, a standard cartridge for rifles and machine guns made perfect sense, both in a manufacturing sense, but also in the tactical and strategic senses: being able to share ammunition would cure one of the chief problems the Allies had during World War 2.

So…What’s the problem? The problem is what the NATO nations standardized on…and no one knows why. One of the most significant standardization decisions of the 20th century — the global convergence on 7.62mm-diameter ammunition — remains curiously undocumented and logically inexplicable.

Consider the scope of this convergence: the Soviet 7.62×25mm Tokarev pistol cartridge for handguns and submachine guns; the 7.62×39mm “intermediate” rifle round for the AK-47/AKM; the 7.62×51mm NATO standard for the M14, FN FAL and H&K G3, as well as in the M-60 and MAG-58/M240 General Purpose Machine Guns (GPMG’s); and the 7.62×54mmR Russian full-power cartridge in the ‘Dragunov’ SVD “Designated Marksman’s Rifle” (DMR) and the PK-series GPMG. Four distinct ammunition types, serving five completely different tactical roles — pistol, submachine gun, assault rifle, battle rifle, and machine gun — yet all sharing the same precise bore diameter to within hundredths of a millimeter.

From a manufacturing perspective, this represents extraordinary efficiency. The same rifling buttons, bore drilling equipment, and quality control gauges can produce barrels for weapons ranging from sidearms to tripod-mounted machine guns. But this efficiency only matters if you’re planning coordinated, large-scale production across multiple weapon systems — exactly what you’d need for rapid global mobilization. More importantly, uniformity is a real concern, because of how “good enough” barrels can be made in very basic workshops.

The timeline of adoption makes conventional military explanations even more problematic. When NATO standardized on 7.62×51mm in the 1950s, superior alternatives were readily available. The .30-06 Springfield had proven performance and massive existing production infrastructure. The 8mm Mauser was the world’s most widely distributed rifle cartridge. The .303 British had decades of successful Commonwealth service.

Instead, NATO chose to develop an entirely new cartridge that required complete retooling of production lines and weapons systems. This makes sense tactically, strategically, politically and diplomatically. No doubt. You take the logistical and manufacturing infrastructure hits, but it makes everyone in the alliance feel like they’re not the only ones making sacrifices. The official justifications — improved efficiency and reduced weight — however, would apply equally to other available diameters.

So — why 7.62mm diameter, specifically? Why precisely the same diameter as the bullets used by the Soviet Union…not the cartridges, not the bullets themselves, but the bullet diameter?

The mystery deepens when examining the ballistic evidence. The abandoned cartridges — .303 British, 8mm Mauser, and .30-06 — all delivered essentially identical performance, despite bore diameters ranging from 7.57mm to 7.92mm. The differences are all within normal manufacturing tolerances and offer no meaningful ballistic advantages.

From a purely ballistics and physics perspective, these major “battle rifle” cartridges deliver functionally identical terminal performance despite NATO’s insistence on 7.62x51mm standardization. Cross-sectional analysis reveals the marginal differences:

  • The .30-06 Springfield (150gr @ 2910 fps) delivers 2,820 ft-lbs of energy
  • The 8mm Mauser (198gr @ 2600 fps) produces 2,800 ft-lbs
  • The .303 British (174gr @ 2440 fps) generates 2,300 ft-lbs
  • The 7.62x51mm NATO (147gr @ 2750 fps) yields 2,470 ft-lbs

These performance variations fall within normal manufacturing tolerances and environmental factors. At combat ranges under 400 meters (which is the normal range for most infantry engagements), the sectional density, penetration, and lethality differences in these cartridges are statistically insignificant. Wind drift, drop, and terminal ballistics vary by mere percentages.

The engineering reality is that any of these cartridges would have served NATO’s stated requirements equally well, as the FN-49 rifle would demonstrate, being made in multiple cartridges, depending on what the customer wanted. The choice of 7.62mm over existing alternatives cannot be justified by ballistic superiority – suggesting the true rationale lay elsewhere entirely.

SAFN .30-06 Springfield 1951. 2007 photo by Wikimedia User “Ainat00”. CCA/4.0 Int’l.

 

The technical evidence is clear: NATO’s choice of 7.62mm as a bullet diameter cannot be explained by ballistic superiority or manufacturing convenience alone. When military organizations abandon proven systems and invest billions in retooling for marginally different alternatives, there are usually compelling strategic reasons documented in procurement records. But those records, if they exist, remain conspicuously absent from public view. What we’re left with is a pattern that suggests coordination on a scale that transcends normal military alliance cooperation—and raises uncomfortable questions about what scenarios would justify such systematic preparation.

Manufacturing compatibility, not ballistic performance, appears to have been designed for rapid, large-scale interoperability — but between whom, and for what purpose?

Yet somehow, across different continents, political systems, and industrial bases, everyone converged on 7.62mm as a bullet diameter. The Soviets, developing their own weapons independently, chose the 7.62mm bore diameter for their entire small arms family, because they had been using it for so long, and wanted to make only the most minimal changes, as their industrial base struggled to recover from the devastation of World War 2.

But then, we have the example of NATO, deciding to completely retool their arms infrastructure to make a completely new round…whose diameter was precisely the same as that of their supposed enemies on the opposite side of the Fulda Gap…not the same cartridges, but the same bullet diameters — the most important part of a modern firearm. To put the proverbial ‘last nail’ on the problem, the only 7.62mm diameter weapon in wide use by NATO members at the organization’s formation in 1949 was the US .30 Carbine round, which is 7.62x33mm.

The only logical possibility is clear: This wasn’t market pressure or alliance requirements — this was systematic coordination at a level that transcends normal military procurement.

The implications become more unsettling when considering modern developments. Recent U.S. military procurement of obsolete M60 GPMG’s, massive ammunition purchases by US domestic agencies, and the recent emergence of “plug-and-fight” deployment systems all suggest preparation for scenarios requiring rapid mass armament using standardized systems.

The 7.62mm convergence may represent the most successful case of industrial coordination in military history — a decades-long effort to ensure global manufacturing compatibility for weapons systems across supposedly competing nations. Whether driven by legitimate defense planning or more extraordinary circumstances, the technical evidence suggests coordination at levels most people would find difficult to accept.

The question isn’t whether this coordination exists — the manufacturing evidence is too consistent to ignore. The question is, what scenarios would justify such systematic preparation, and why has the public never been informed of the reasoning behind these decisions?

As we pointed out in the “Hamlet” article above, none of the possible reasons for this subtle standardization are good…But there is one last wrinkle, that I cannot shake from my mind…

All of this happened very quickly…..after 1947.

 

Additional Resources:

NATO Standardization Agreements (STANAGs)
Congressional Defense Primer: Conventional Ammunition Production Industrial Base
International Ammunition Technical Guidelines 

 

 

 

The Freedomist — Keeping Watch, So You Don’t Have To

 

The Shadow Fleets

 

 



Illicit drugs are everywhere. Since at least the Imperial Chinese attempts at curbing the British opium trade, governments have – for one reason or another – tried to end, or at least restrict as far as possible, the flow of drugs they find objectionable. From cannabis to cocaine, and opium/heroin to fentanyl, massive, militarized law enforcement structures have been built up, to try and end the trade.

For the most part, these efforts have failed.

The problem are the iron laws of supply and demand, and the Streisand Effect: If you overreact to the problem, people get curious as to why…and when trust in government is problematic, that urge becomes obsessive. And in an environment of induced artificial scarcity, imposed by efforts to ban “Bad Thing X” – be that drugs or alcohol – both demand for that substance, as well as its price tends to skyrocket…and the harder law enforcement cracks down, the more creative the suppliers get in bringing their product to market.

Case in point: The “narco submarine“. We discussed the “big-state” military aspects of leveraging narco-sub technology last year, but now we take a deeper dive into the flip-side of the “big-state” use of this ecosystem.

The evolution of narco-submarine technology from crude, semi-submersible craft to sophisticated vessels capable of trans-Atlantic voyages represents more than just an escalation in drug trafficking capabilities—it signals a potential paradigm shift in how insurgent and terrorist organizations could maintain covert supply networks across vast distances.

Trans-Atlantic range narco submarine in Aldán, Cangas, Galicia, Spain, 2019, following its capture by Spanish authorities. Photo by Estevoaei. CCA/4.0 Int’l.

Traditional counter-insurgency doctrine has long emphasized the critical importance of disrupting enemy supply lines. However, the emergence of advanced narco-submarines, some capable of carrying multi-ton payloads across oceanic distances while remaining largely undetected, introduces a new variable into this equation. These vessels, originally developed by South American drug cartels to transport cocaine, have demonstrated remarkable sophistication in recent seizures, featuring diesel-electric propulsion, advanced navigation systems, and even air-independent propulsion capabilities.

The implications now extend far beyond narcotics. Intelligence assessments suggest these platforms could theoretically transport weapons, explosives, communications equipment, or even personnel across traditional maritime security perimeters. Unlike conventional smuggling methods that rely on commercial shipping or aircraft — both heavily monitored — narco-submarines operate in the vast expanses of international waters where detection remains extraordinarily difficult.

This point cannot be overstated: While the “old school” methods have long been known, and control measures developed to address them, the rise of covert submarine logistics at the small(ish) scale is a titanic problem, because almost any coastal beach, inlet or swamp is now a potential delivery point. While traditional inseriton methods like rough airstrips or road checkpoints can be easily identified, the sheer scale and unimproved nature of naval landing avenues severely hamstrings surveillance efforts – airstrips, roads and even drop zones are almost comically easy to identify, especially when they are not on official maps as crossing or entry points. Beaches, however, are everywhere.

Recent interdictions have revealed vessels with ranges exceeding 6,000 nautical miles, sufficient to connect South American manufacturing bases with conflict zones in Africa, the Middle East, or even Europe. The technical expertise required to construct these platforms has proliferated through criminal networks, with evidence suggesting construction techniques and blueprints have spread beyond their Colombian and Ecuadorian origins.

A primary case study of even non-submersible combat logistics support to an insurgent force comes from Mozambique, in 2020-2023:

The Islamist insurgency in Cabo Delgado demonstrated sophisticated maritime capabilities between 2020-2023 that transformed what began as a land-based rebellion into a complex amphibious threat. Ansar al-Sunna militants systematically leveraged traditional dhow boats and small craft to create covert supply networks that proved nearly impossible for Mozambican security forces to interdict.

The insurgents’ capture of the port of Mocímboa da Praia in August 2020 marked a strategic watershed, providing direct access to established heroin trafficking routes from the Makran Coast. Intelligence assessments suggest the group began “taxing” drug shipments landed from dhows, creating a maritime revenue stream that complemented traditional funding sources. This convergence of insurgent logistics and narcotics trafficking created a self-reinforcing cycle — drug money funded operations while operational control over landing sites enabled further revenue collection.

The tactical sophistication was remarkable. Insurgents used coordinated land-sea assaults, arriving simultaneously from multiple vectors to overwhelm defensive positions. They demonstrated proficiency with maritime navigation, successfully conducting what were functionally full-on amphibious operations across the island chains of the Quirimbas archipelago. Perhaps most concerning, they showed adaptive capabilities — after reportedly sinking a Mozambican patrol boat with an RPG-7, they captured additional vessels to expand their maritime fleet.

The geographic advantages were substantial. Cabo Delgado’s extensive coastline, numerous islands, and traditional reliance on dhow-based trade provided perfect cover for covert supply operations. The insurgents exploited the fact that legitimate maritime commerce — fishing, inter-island transport, and traditional trade — created background noise that masked military supply movements. With limited Mozambican naval capabilities and virtually no maritime patrol presence, the ocean became an uncontested highway for insurgent logistics.

For insurgent groups, the strategic value is clearly compelling. As the World War 2 OSS demonstrated, traditional arms trafficking routes face increasing scrutiny from international security partnerships and advanced surveillance systems. Port security measures, while effective against conventional smuggling, are largely irrelevant to vessels that can surface miles offshore and transfer cargo to smaller craft or coastal staging areas.

The financial model also aligns with insurgent economics. Drug trafficking organizations have demonstrated willingness to treat narco-submarines as expendable assets — vessels are often scuttled after single-use missions. This operational approach could extend to insurgent logistics, where the strategic value of delivered materiel outweighs platform preservation.

Counter-narcotics operations have struggled with these platforms despite significant resource investments. The U.S. Coast Guard estimates that even with enhanced detection capabilities, the vast majority of narco-submarine transits remain undetected. This detection challenge would be magnified in insurgent applications, where hostile groups’ operational security might be even tighter and cargo manifests wouldn’t trigger the same intelligence indicators as bulk narcotics shipments.

The convergence of criminal and insurgent networks is not theoretical — established precedents exist in regions where these organizations share operational space and mutual interests. The DEA has linked 19 of 43 officially designated foreign terrorist organizations to some aspect of the global drug trade, demonstrating that such collaborations are already occurring. The Revolutionary Armed Forces of Colombia (FARC) provided a decades-long example of how insurgent groups can leverage drug trafficking networks to fund operations and maintain supply lines, activities that continue with the FARC’s splinter factions.

Perhaps most concerning is the adaptive nature of this technology. Each interdiction reveals new innovations: improved stealth characteristics, enhanced range capabilities, and increasingly sophisticated construction techniques. The rapid evolution suggests that by the time security services develop effective countermeasures, the threat may have already evolved beyond current detection and interdiction capabilities.

This potential weaponization of narco-submarine technology by hostile non-state actors represents a convergence of criminal innovation and insurgent logistics that could fundamentally challenge existing maritime security frameworks and force a reassessment of how covert supply networks might operate in an era of advanced surveillance.

 

 

 

The Freedomist — Keeping Watch, So You Don’t Have To

 

The 30-Minute Apocalypse: How Coordinated Grid Attacks Could Cripple America

 

 

 



Electricity if the foundation of modern society. Many people wistfully ponder the idea of living permanently in the wilderness, the old “back to Nature” idea. The fact is, most people – at least in the West – are going to survive in the wild for longer than a week. Electricity is what allows you to read this, and not simply because the immediate of an internet connection: electricity is fundamental to the industrial processes that made the device you are reading this on.

America’s electrical grid represents both the backbone of modern civilization and its most vulnerable single point of failure. Recent incidents at power substations across the country have revealed a terrifying reality: a relatively small number of coordinated attacks could plunge vast regions into darkness for weeks or months, with cascading effects that would make Hurricane Katrina look like a minor inconvenience.

The December 2022 attack on two Duke Energy substations in Moore County, North Carolina, illustrated the basic vulnerability. Two individuals with rifles caused a blackout affecting 45,000 people for several days. But this was amateur hour compared to what organized groups could accomplish with proper planning and coordination.

The math is sobering. The Department of Homeland Security has identified roughly 55,000 electrical substations nationwide, but destroying just nine of the most critical ones could theoretically black out the entire continental United States. Unlike the heavily fortified nuclear plants or major power stations, most substations are protected by little more than chain-link fencing and security cameras. Many critical transformer installations sit exposed in rural areas with minimal surveillance and lengthy emergency response times.

Marelli coupling transformer in Italy. 2020 photo by Herbert Hönigsperger. CCA/4.0 Int’l

 

What makes this threat particularly insidious is that it doesn’t require sophisticated weapons or technical expertise. The critical transformer equipment that steps down high-voltage transmission lines is custom-manufactured, expensive, and takes 12-18 months to replace under normal circumstances. A coordinated rifle attack, or even the intelligent use of a reciprocating saw, on multiple substations simultaneously could create a replacement bottleneck that extends outages for months across multiple states.

The cascading effects of a decently-coordinated series of attacks would be catastrophic. Within hours, water treatment plants would lose power, leading to pumping capacity failures. Hospitals could switch to backup diesel generators, but their fuel supplies typically last 72 to 96 hours. Cell towers would go dark as their backup batteries drain, as even those with some minimal solar backups would be drained faster than solar can recharge them. Gas stations could not pump fuel; grocery stores and ATM’s stop working – in the case of the grocery stores, that would be because few, if any,m are set up to switch to paper receipts. Supply chains would being to collapse, as refrigerated transport becomes impossible, electronic payment systems began failing, and regional grocery supply centers would not be able to fulfill orders, if they were even able to receive them.

Behind this vulnerability is the very thing that makes modern society as comfortable as we have become accustomed to: Just In Time Delivery. This is the system that dispatches all manner of inventory to retailers, homes and factories at will, usually arriving within 24 to 96 hours after ordering. This means that very few warehouse areas have more than three or four days of stock in their “back rooms”, at best. This is one of the reasons for the videos of stores being emptied in mere hours when a disaster strikes – it’s not simply damage to the structure, but the location’s inability to order replacement stock.

Most Americans have never experienced true grid-down conditions lasting more than a few days. The best estimates indicate that potentially 90% of Americans would be dead within one year of a sustained nationwide blackout due to starvation, disease, and violence. Even regional blackouts lasting weeks would likely trigger mass refugee movements, as happened in the aftermath of Hurricane Katrina, that local authorities couldn’t manage.

The threat isn’t theoretical. In recent years, domestic extremist groups have conducted surveillance of electrical infrastructure. FBI investigations have uncovered plots targeting substations by nihilistic accelerationists larping as neo-Nazis who believe destroying the grid would trigger societal collapse and racial conflict. The knowledge required for effective attacks are spreading through online forums and training materials.

International actors represent an even greater threat. Chinese and Russian operatives have been caught conducting reconnaissance of American electrical infrastructure. State actors could coordinate cyber attacks on grid control systems with simultaneous physical attacks on key substations, maximizing damage while minimizing the chances of rapid recovery.

And what happens if such a series of attacks do happen? None of the possibilities are good. Aside from the initial casualties of the sick and injured as hospital generators run dry of fuel, and those dying in the panic after the lights go out, the near-term (60 – 90 days) will see vast deaths via starvation, as most people have perhaps only two or three weeks worth of food at home, and human performance degrades fast, the longer we go without food. Rural areas are better positioned, since those areas are food producers by default, but they do not have the capacity to absorb refugees, nor to suddenly step up food production, because of the physics and biology of agriculture: even without the fact that most farmland is sectioned off for corporate, single-crop “monoculture” products, it takes time, at least sixty to ninety days, to grow most plants into nutritious crops that will sustain a human. And although hog hunting in the South does produce meat, it is barely impacting the hog population – and the vast majority of Americans have no comprehension of how dangerous feral hogs really are.

Accelerationist dream-world. Pixabay.

The fix is neither quick, simple nor cheap. Hardening critical substations would cost billions and take years to implement. Installing backup transformer capacity requires massive infrastructure investments that utility companies stridently resist making without punitive federal mandates. Meanwhile, the grid continues operating with vulnerabilities that a competent adversary could exploit with devastating effectiveness.

The uncomfortable truth is that America’s electrical grid was designed for reliability and efficiency, not security. In an era of increasing domestic extremism and great power competition, that design philosophy represents a strategic vulnerability that adversaries understand better than most Americans. The question isn’t whether someone will eventually attempt a coordinated grid attack — it’s whether we’ll address these vulnerabilities before they do.

The only good thing in this, is that if we go down, we will take the reast of the “developed world” with us.

Yay. I guess.

The lights we take for granted could go out faster than most people imagine, and stay out longer than our society could survive. As with many things we report here, you are on your own – after reading this, you cannot claim that you weren’t warned to prepare, because the government will not be able to help you.

 

 

 

The Freedomist — Keeping Watch, So You Don’t Have To

 

The Gilded Cave

 

 

 



 

The ultra-wealthy’s latest status symbol isn’t a super-yacht or private island — it’s a luxury survival bunker. From New Zealand’s exclusive retreats to underground complexes in Montana, billionaires are spending millions on fortified sanctuaries designed to weather civilization’s collapse. But these elaborate preparations reveal a fundamental misunderstanding of how disasters actually unfold and may create more problems than they solve.

While the idea of the “social construct” has been ballyhooed almost to death in the early 21st Century, it is a solid and verifiable doctrinal base. At the same time, the antithesis is also true…and in this context, the statement that “wealth is a social construct” is also a fundamental truth.

Although many people at the lower end of the economic spectrum may rage aginst the idea that they are taking part in a “social construct” from the moment they wake up in the morning, for the ultra-rich, the idea has been slowly growing that their wealth equates to them the level and aspects of medieval barons, that their wealth can insulate them from catastrophic events, events that result in a “Mad Max/Road Warrior” type of world. It is important to remember that the so-called “Robber Barons” of the late-19th Century in America and Europe may have been rapacious, but they were careful to cultivate actual loyalty among their guard forces.

For the modern mega-wealthy, such an attitude is what is known as “whistling past the graveyard“, a phenomenon best represented by the “luxury survival bunker“.

The modern luxury bunker industry promises the impossible: maintaining elite levels of comfort and safety while civilization burns above. Companies like Vivos and Rising S offer underground mansions complete with wine cellars, home theaters, and hydroponic gardens. The Survival Condo Project in Kansas converted a former missile silo into luxury apartments selling for millions, featuring a swimming pool, rock climbing wall, and armored vehicles. The implicit promise is that money can buy not just survival, but the preservation of pre-disaster lifestyle.

Underground World Home swimming pool built structure for the New York world’s Fair, 1964. Public Domain.

This approach fundamentally misunderstands disaster dynamics. Real catastrophes — whether economic collapse, climate disasters, or social upheaval — require adaptation, community cooperation, and practical skills, not isolation behind reinforced concrete. History shows that those who survive major disruptions are typically embedded in resilient communities with diverse skill sets, not isolated individuals hoarding resources.

We’re not talking about official, taxpayer-maintained “continuity of government” bunkers like Mount Weather, Raven’s Rock, or military command centers like the Cheyenne Mountain Complex. No, we’re talking about private residences purchased by the ultra-rich.

Photo of the North Portal entrance to Cheyenne Mountain. Public Domain.

The bunker mentality creates several critical vulnerabilities for both survival and immediate security. First, these facilities become obvious targets once their existence becomes known. A luxury bunker essentially advertises its contents to anyone desperate enough to attempt breaching it. The very features that make them appealing — visible wealth, sophisticated systems, stockpiled resources — make them magnets for organized groups with nothing to lose.

Second, luxury bunkers require massive ongoing maintenance and technical expertise that their wealthy occupants rarely possess. Climate controls, water filtration, communications equipment, and power systems all demand specialized knowledge. When the contracted maintenance crews can’t or won’t reach the facility, these sophisticated systems become expensive liabilities. A billionaire who can’t repair a generator is far worse off than a farmer with a hand pump.

Third, the psychological toll of bunker life contradicts its luxury branding. Extended isolation, even in comfortable surroundings, creates mental health challenges that luxury amenities can’t address. Humans require social interaction, purpose, and connection to larger communities. A gold-plated prison cell is still a prison cell, and the mental deterioration that follows undermines the clear thinking necessary for actual survival.

The real self-defeating irony is economic. The resources spent on individual bunkers could create far more security if invested in community resilience, renewable infrastructure, or addressing the root causes of potential disasters. A billionaire who spent bunker money on local food security, renewable energy projects, or disaster preparedness for entire regions would be far safer than one hiding underground with a wine collection.

The bunker fantasy reflects the same thinking that created many of our current vulnerabilities, chiefly the belief that individual wealth can solve mass social inequality, and the fact that systemic risks require community-level responses, not individual escape plans. By definition, if society has collapsed enough to require bunker living, the economic systems that created that wealth no longer exist to maintain the bunker’s operations.

Genuine resilience comes from building robust, interconnected systems and communities capable of adapting to change. The wealthy would be better served by investing in the social fabric that sustains civilization — or which can at least “restart” it — rather than planning its abandonment. After all, if your survival plan assumes everyone else has failed, you’ve probably misunderstood both the problem and the solution.

True security isn’t found in isolation — it’s built through interdependence, community investment, and addressing challenges collectively rather than hiding from them individually.

But there is another psychological area to address: the delusion of “elite leadership.”

Leadership is only hard when you’re not humble…and getting into the category of being among the “ultra-rich” argues strongly against humility. “Humble” people do not vacation at Lake Como or along the Riviera on a yacht that costs more than a mid-sized city’s fire department engines. Consider the battle-hardened special-ops veterans the ultra-wealthy hire as “private security” (whether they actually know what “executive protection details” actually entail): As long as the world is intact, and the paychecks continue to flow, sure, they are happy to protect – even in lethal situations – the person and family of the person signing their checks.

But really – when everything goes to hell, who is that elite Operator going to put first: the tech-bro whose money is now so much vaporware, or their own family? Think about it.

All of the above being said, preparing for disasters – even “mega-disasters” – is not wrong. It is highly prudent and advisable. But don’t expect that burning your credit card limits on stuff will save you. Supplies are good. Training is vital. But should the worst ever happen, you are not a “lone wolf”, whether you have a family or not.

Act accordingly.

 

 

The Freedomist — Keeping Watch, So You Don’t Have To

 

The Terror Group Plotting the End of the World…

 

 

 



 

Introduction

Lurking in the digital wasteland of the internet’s darker corners, is a beast. A group so vicious, that they have hit on a novel way of undermining civilization…by directly targeting children, like a truly deranged version of Fagin, from Oliver Twist, joining up with Jack the Ripper.

You need to pay attention, and spread the word. Monitor what your children are doing online, because these animals want them dead…and you, as well, if they can make that happen.

The 764 Terror Network: The Growing Digital Threat to Children

The 764 terror network represents one of the most disturbing online terror organizations yet encountered by law enforcement, targeting vulnerable children worldwide, to the extent of being classified as a “Tier One” investigative matter by the FBI, and officially designated as a terrorist network by the U.S. Department of Justice. Named after the zip-code of its founder’s Texas hometown, this decentralized network has evolved from a localized online community into a global movement that the FBI now characterizes as involving “nihilistic violent extremists.”

Origins and Leadership

The group known as “764” was founded in 2021 by Bradley Chance Cadenhead, then a 15-year-old from Stephenville, Texas, who operated under the username “Felix” on Discord. A bullied teenager who had dropped out of school, Cadenhead retreated to his bedroom and created his new online persona, regularly posting shocking images and cultivating a following of like-minded individuals.

Since the launch of the initial 764 group, which garnered a couple of hundred Discord followers, 764 has become a global movement, with an array of offshoots and subgroups that often rebrand and change their names to help keep social media companies and law enforcement from tracking them. Detectives working on these cases have told authorities to treat 764 “more as an ideology” than as a specific group.

In March of 2023, Cadenhead pleaded guilty to nine counts of child pornography possession and was sentenced to 80 years in state prison, with the judge citing his self-described status as a “cult leader”.

The network draws ideological inspiration from the Order of Nine Angles (O9A), a satanic neo-Nazi terrorist organization, incorporating elements of Western esotericism, Satanism, and accelerationist ideology aimed at societal collapse.

The FBI Terror Network Overview

As a group, 764 is a decentralized, Satanic, neo-Nazi, transnational, “sextortion” network that is reportedly adjacent to the Order of Nine Angles, a far-right Satanic terrorist network. It is classified as a terror network by the United States Department of Justice (DOJ), and is considered a terrorist “Tier One” investigative matter by the Federal Bureau of Investigation (FBI). The FBI has more than 250 investigations underway into the network of violent predators known as “764,” making it the number one digital threat to children.

Operational Methods and Scope

764 operates primarily through gaming platforms like Roblox, Discord, and Telegram, methodically targeting minors aged 8-17, particularly those who are marginalized or struggling with mental health issues. The network follows a systematic approach: members befriend victims online, obtain compromising photos through social engineering or feigned romantic interest, then use blackmail to coerce increasingly disturbing acts including self-harm, animal abuse, and the production of child sexual abuse material.

Victims are frequently goaded into carving “764” or their abuser’s username into their bodies, sometimes “going down to the bone,” and these images become valuable currency within the network. The ultimate goal is often to push victims toward suicide, which is livestreamed for the entertainment of network members.

764 has been classified as a violent online network that seeks to destroy civilized society through the corruption and exploitation of vulnerable populations, which often include minors. The 764 network’s accelerationist goals include social unrest and the downfall of the current world order, including the U.S. Government. That’s why the FBI’s Counterterrorism Division and the Justice Department’s National Security Division are now looking at 764 and its offshoots as a potential form of domestic terrorism, even coining a new term to characterize the most heinous actors: “nihilistic violent extremists.”

764’s Connection to Mass Violence: A Growing Pattern

The clearest documented connection between the 764 network and school violence is the case of Solomon Henderson, the 17-year-old Antioch High School shooter who killed one student in January 2025. Henderson made specific references to 764 and similar groups in social media posts before his attack, and was found to be “mutuals” online with Madison, Wisconsin school shooter Natalie Rupnow.

Henderson’s 288-page diary revealed extensive engagement with 764 ideology, including tattoos of swastikas and “764” on his arm, and posts stating “I feel like God. I can decide who lives and who dies” after his rampage. Court documents consistently show that 764 members initially come to law enforcement attention through tips regarding planned mass violence, not just child exploitation charges.

European Violence Connections

In October 2024, a 14-year-old Swedish 764 member known as “Slain” livestreamed eight attacks and three stabbings in Hässelby after running an offshoot called “No Lives Matter“. These attacks were filmed, set to music, and shared online to inspire others to engage in violence, with the perpetrator becoming a “celebrity” within 764 spaces and his videos regularly circulated among members.

Ideological Framework for Violence

FBI officials report that 764 networks deliberately share violent content and glorify past mass-casualty attacks such as the 1999 Columbine shooting, while introducing victims to neo-Nazi and Satanist ideologies to “desensitize these young people so that nothing really disturbs them anymore“. The network actively encourages people suffering from mental health problems to “kill themselves on camera or commit mass shootings“.

Other documented cases include 764 member Aidan Harding, charged in February 2025 with possession of child pornography, who had also allegedly plotted a mass casualty event and possessed 20 guns. Similarly, 23-year-old Hugo Figuerola was arrested in Spain for threatening a mass shooting and bombing in Valencia.

The pattern suggests 764 functions not merely as a child exploitation network, but as an active radicalizing force that systematically pushes vulnerable individuals—many of them minors themselves—toward increasingly extreme acts of violence, culminating in real-world attacks that mirror the online violence they’ve been conditioned to celebrate.

Direct Connections Between Rupnow and Henderson

Extremism researchers have documented that both Natalie Rupnow (the Madison shooter) and Solomon Henderson (the Nashville shooter) were active in the same online networks that glorify mass shooters, and they had direct contact as “mutuals” on social media platforms. Moments before Rupnow opened fire, she posted a photograph showing a white supremacist hand gesture, and Henderson immediately responded “Livestream it“.

After the Madison shooting, Henderson became “fixated” on Rupnow, posting numerous times on X supporting her and boasting that they were “mutuals,” sharing posts like “i used to be mutuals with someone who is now a real school shooter“. Henderson later called her a “Saintress” (a term common in these networks), used her photograph as his profile picture, and said he scrawled her name and those of other perpetrators on his weapon and gear.

Rupnow’s social media accounts showed “interest in neo-Nazi ideology and neo-Nazi violence, as well as demonstrating interest and engagement in online forums venerating mass shooters,” including posts featuring images of Parkland shooter Nikolas Cruz and references to Columbine and other mass attacks. At the time of her attack, Rupnow followed just 13 users on X, two of which were accounts linked to Henderson.

The extremist networks both shooters inhabited include Terrorgram, 764, and “Com” communities that have engaged in activities leading to convictions for child sexual abuse materials, sexually exploiting children, and soliciting hate crimes and murder of federal officials. These networks are described [https://nashvillebanner.com/2025/01/25/online-extremism-networks-radicalizing-young-people/] as “an online subculture that celebrates violent attacks and radicalizes young people into committing violence”.

Shared Ideological Elements

Both teenagers inhabited online networks with “an array of influences, ideologies and aesthetics” including “white supremacist, antisemitic, racist, neo-Nazi, occult or satanic beliefs” – the same ideological framework that characterizes 764 and its affiliated networks.

While Rupnow wasn’t directly identified as a 764 member, she was clearly operating within the same ecosystem of extremist networks that overlap with and feed into 764’s recruitment and radicalization pipeline. The documented connections show how these interconnected online communities create pathways between different extremist groups, allowing individuals to move between various networks while being exposed to similar radicalizing content and encouragement toward violence.

Recent Law Enforcement Actions

The FBI first issued a public warning about 764 in September 2023, urging parents to monitor their children’s online activities closely. Multiple federal prosecutions have resulted in significant sentences, including a 30-year prison term for Richard Densmore (“Rabid”), who created “Sewer” communities on Discord specifically for recruiting and exploiting children.

Multiple arrests have occurred worldwide. In March 2024, Cameron Finnigan, a 19-year-old from Horsham, UK, known as “Acid”, was arrested, and in January 2025 pleaded guilty to encouraging suicide, possessing a terrorism manual, and possessing indecent images of a child. Finnigan was subsequently sentenced to six years in jail.

In April 2025, Leonidas Varagiannis, also known as “War,” 21, a citizen of the United States residing in Thessaloniki, Greece, and Prasan Nepal, also known as “Trippy,” 20, of North Carolina, were arrested and charged for operating an international child exploitation enterprise known as “764”. As alleged, the defendants engaged in a coordinated criminal enterprise and led a core subgroup within 764 known as 764 Inferno, which allegedly exploited at least eight minors, some as young as 13, and operated through encrypted messaging applications.

Unfortunately the network has, perhaps inevitably, spawned numerous offshoots including CVLT, Court, Kaskar, Harm Nation, and others, making it increasingly difficult for law enforcement to track and disrupt their activities.

Platform and Parental Awareness

Experts emphasize that 764 specifically targets children through popular gaming platforms, making parental awareness and monitoring of online activities crucial for protection. Mental health professionals note that the network specifically seeks out vulnerable children experiencing depression, isolation, or low self-esteem.

The 764 network represents a convergence of terrorist ideology, technological exploitation, and child abuse that challenges traditional law enforcement approaches, requiring coordinated international responses to protect vulnerable young people from what authorities describe as one of the most heinous online threats ever encountered.

Conclusion

The 764 network, without doubt, poses one of the most disturbing online threats to children since the opening of the Internet to the general public, combining elements of extremist ideology with systematic child exploitation. Law enforcement agencies worldwide are treating it as a top priority threat, deploying significant resources to combat its spread and protect potential victims.

The Freedomist takes this threat seriously, and is continuing its investigation, as of this writing. There may be a deeper situation at hand, but as of this article, we are still investigating that angle to avoid having to retract anything.

You should take this seriously, as well. This is an immediate threat to anyone reading this, as well as to their wider community.

 

The Freedomist — Keeping Watch, So You Don’t Have To

 

Hamlet…And The Pig

 

 

 



The late actor Andreas Katsulas, in his role on the TV show “Babylon5” as Ambassador G’Kar, delivered the line:

 

“…something is moving, gathering its forces, quietly, quietly, hoping to go unnoticed…” (Babylon 5, S2E2, “Revelations”)

 

In 2025, something out there, for real, is “…gathering its forces, quietly…hoping to go unnoticed…” This “something” has been doing so for at least two decades, as of this reporting, that is preparing for some event or possibly multiple events, beginning in 2030, something that may represent an existential threat to human civilization, as we know it. The Department of Defense (DoD) and the Department of Homeland Security (DHS) both know this, and have been quietly moving on a plan of mitigation, a plan that transcends petty political party squabblings.

A plan that definitely involves you.

The first glimmer of this appeared in 2012, when people began asking why the DHS and DOJ were buying so much ammunition, enough – so those agencies and their cheerleaders claimed – for every armed DHS agent to fire over 100 rounds per month, according to the Government Accounting Office (GAO). To put a fine point on it DHS, alone, let two identical contracts on the same day, totaling over 46 million rounds of – per the report – “.223, 30-06, .308, 12 gauge, .357, .38, .40, .45, 7.62, and 9mm”…The shooters reading this already see two oddities: both .308 and 7.62 ammunition, rifle rounds that are dimensionally identical, differing only in specific technical details.

A portion of GAO-14-119 (2014). Government Accounting Office. Public Domain.

Interesting, but not necessarily alarming…if you don’t know what you’re looking at.

That’s a LOT of ammunition.

How much is “a lot“? The Department of Defense was burning through c.1.8 billion rounds of small arms ammunition, per year, at the height of the fighting in Iraq, and was buying ammunition from Israel in an attempt to address the shortfall…and not even the GAO could hide the scale of the purchases, no matter how hard they tried.

…but hey, that’s just some weirdo, “Alex Jones” ravings, right?

Right?

Well…the US Army, out of nowhere, released a massively redacted procurement order on September 23, 2024, to purchase M60E4/E6 General Purpose Machine Guns (GPMG’s), with conversion/upgrade and training kits, for a total amount of $14,960,324.75. Some of the un-redacted portions of the purchase order are extremely interesting:

1. Technical Specifications:

  • M60E4/M60E6 variants with conversion kits
  • “Conversion kit upgrades any serviceable M60 receiver to M60E6/E4 configuration”
  • “Can convert and upgrade a serviceable M60 machine gun in fewer than 30 minutes”

2. Operational Requirements:

  • “Only One Responsible Source” – they specifically =need= M60s, nothing else will work
  • “No prior contract for this requirement was accomplished using Full and Open Competition”
  • “US Ordnance is the only known source that possesses the capability”

3. Customer Base Curiosities:

  • “M60E4 and M60E6 MGs are already currently in use by the [REDACTED] customers”
  • “Through its utilization for over two decades, [REDACTED] customers’ armed forces personnel have become very familiar with the M60 MG series”

4. Timeline Curiosity:

  • Five-year contract delivering through 2029

 

Company C, 1st Battalion 5th Marines machine gunner fires his M60 machine gun at an enemy position. February 1968, Hue City, Republic of South Vietnam. USMC photo. Public Domain.

 

Danish Machine gun M60E6. 2014 photo by Flemming Diehl. CCA/4.0 Int’l

Most curious. The culture of pedantic security tends to undo the intent of those most desperate to maintain it, because the extensive redactions, themselves, speak volumes…

The United States military – except for some very specialized units like the US Navy SEALS – hasn’t used the M60 in any numbers since about 2005. We supposedly “gifted” the African nation of Senegal some 2,500 M60’s (XLSX download) in 2002…Or – did we?

Certainly, Senegal got some older model M60’s from us, but in 2025 their total armed forces (army, navy and air force) currently stand at c.17,000 personnel – 2,500 GPMG’s would be one M60 for every 6.8 troops; in 2002, when this transfer supposedly happened, Senegal had all of 9,400 personnel, all-in…which would have been one M60 for every 3.76 troops. That is completely ludicrous – no one buys support weapons at that kind of loony ratio.

A portion of the 2014 spreadsheet on the Defense Security Cooperation Agency’s report on “Excess Defense Articles” (EDA’s) – Warning: Direct .xlsx download. Public Domain.

Very curious – what happened?

According to the Defense Security Cooperation Agency (DSCA): “…When items in the Department of Defense (DoD) inventory are no longer needed by any military service…they can be declared as excess equipment or Excess Defense Articles (EDA)”, but, “…Not all EDA are overseas; the majority will be in depots located in the continental United States, along with a few in Europe and one in Asia. EDA would only be overseas when in consolidated depot repair yards or where items are taken in-country as U.S. forces are leaving. In such cases, the host nation gets no preferential treatment with respect to EDA – unless Congress passes special legislation authorizing direct transfers in-country…

So – where did those 2,500 M60’s actually go, in 2002? Are they still in US Government warehouses? The procurement model makes no logical sense, otherwise.

Most “land-force” infantry-type battalions have anywhere between twelve and twenty-25 GPMG’s, depending on their exact Table of Organization & Equipment (or, “TO&E”); this would include both the M60 and its replacement, the M240. The Pentagon’s near-$15 million order would field anywhere between 2,100 and 2,500 weapons, likely at the lower end. Assuming a median figure of 20 GPMGs to a battalion (600 – 1,000 people), c.2,100 GPMG’s are enough to outfit about 100 battalions.

That is roughly 60,000 – 100,000 troops…Or is it?

You see, that number is based on only the “new-build” weapons in at US Army contract…What about the “conversion kits”? As specified, these kits can upgrade “older” M60 weapons to the E6/E4 standard “in less than 30 minutes“. There is no mission profile that requires that kind of conversion speed…no conventional (or even special operations) mission profile, that is.

As the purchase order specifically blanked out the numbers of both new weapons and conversion kits being ordered, the only reasonable conclusion is to assume a 1:1 ratio, of “new weapon:conversion kit”. Another reasonable assumption, based on the most commonly-quoted price for a new and complete M60E6, of some $6,000, is that a conversion kit likely runs around $1,000, each. Thus, using a figure of $7,000 for the combination of one new weapon and one conversion kit, that equates to 4,200 total weapons (4,274.3785 weapons, to be pedantic) for the near-$15 million purchase order.

In other words, they are reactivating old weapons, to be placed alongside the new ones.

At the above median of 20 weapons to a battalion-equivalent unit, that comes to 213.71 battalions…or – about the current size of the United States Marine Corps, when counting the low end of what constitutes a “battalion” (c.600 troops).

That’s a lot of battalions…Expressed differently, this would allow for some 20 or so battalion-equivalents of “security units” (essentially, Military Police) to be mobilized in all ten FEMA administrative regions.

FEMA Region Map, 2024. FEMA. Public Domain.

And, let’s not forget the fact that this order is for…M60 machine guns.

As noted above, except for a very few in use by highly specialized units like the US Navy SEALs, very few armed organizations use the M60 in any configuration or numbers, and the few who do, are mostly looking to replace their GPMG’s with something like a MAG-58/M240 or a Russian PK-series…So – who, exactly, are going to be getting up to 4,200 M60E6’s, enough to outfit a multi-division corps?

Given the level of redactions in the purchase order, we are forced into speculative territory, here, over who the likely recipients of this massive number of support weapons might be.

The only group that makes sense, in this context – as bizarre and extreme as it might sound – is the population of the United States, in the form of the Militia of the United States, as described in 10 USC 246 of the US Code…

…I can already hear the howls of laughter – when you’re done, answer this question: Who else would be familiar with the M60 platform in such large numbers?

What most people do not realize about 10 USC 246, is that there is an exception to the 17 to 45 year old age limit: per 32 USC 313, referenced in 10 USC 246 above, all former active-duty Federal military personnel are subject to recall for Militia service – at any time, for any reason – until their 64th birthday.

So…why recall the gray-hairs, and what does this have to do with M60 machine guns?

Simply put: Any veteran of the United States Army or Marine Corps, who served between 1980 and 2000, will be highly familiar with the M60 – and even 25 to 30 years later, will remember how to operate and care for these weapons, with minimal “refresher” time…if given a weapon and a manual. In contrast, someone learning the M240, new, would take a week or so, at least, to learn to operate it safely.

While many people – even self-identifying “Patriots” – pay homage to the concept of “The Militia“, very few have any real idea of what would happen in an actual Militia call-up in 2025: Essentially, a gaggle of well-meaning people – some veterans, most not – would show up to a designated assembly point, most armed with rifles…and, giving credit where it is due, most of those individuals’ rifles will be both in better condition, and frankly just “better” overall, than anything in the hands of the regular military.

But…that’s all they will be: individuals – unorganized, largely untrained, with little in the way of supplies or support weapons…like the M60. That’s a no-win situation, one that has prevented actual militia call-outs for over a century. But it does bring up some interesting questions, chief among them:

If the government anticipates scenarios requiring militia activation, why isn’t there a systematic program already in place to ensure those militia units would be at least somewhat effective?

The M60 procurement suggests they expect to need these capabilities, but there’s no evidence of corresponding human resource development.

Back in 2023, we wrote about some potential scenarios requiring domestic militia activation. The recent procurement patterns, specifically concerning the M60, suggest the government may be preparing for exactly these contingencies, and more, but as of this writing there is no corresponding investment in the human side – while 10 USC 246 can certainly call up the “Militia of the United States“, it specifies no current mechanism for “musters”, unit establishment, or training for those it is designed to call forth…That is a fatal flaw which has existed for over a century, one which needs addressing, because armed people with no organization or command structure are a significant liability, not an asset. That’s something you, the Reader, might want to address by contacting your Representatives and Senators about modernizing 10 USC 246 implementation.

But we’re getting ahead of ourselves here.

Clearly, someone in Washington thinks that something is on the horizon. Between the massive ammunition purchases hand-waved off as “bulk buying of training ammunition“, and now a bizarre contract for a machine gun design some 20 years out of general issue, to meet completion in five years time, it is clear that something is afoot.

But, what, exactly? None of the logical and/or viable options are good.

While a certain sector of the “political fringe” is still on about an invasion of the United State by everyone from North Korea to Iran – which, given the failures of the Biden administration in 2021-2025 – is now a valid concern, not least because at least someone in the US Government has known about the threat for over 50 years, the reality is that “social” or “economic” collapse is not really a very realistic model requiring actual militia call-ups and martial law…but there are a few possibilities of concern, beginning in, or just prior to, 2030:

  • Beginning in 2029-2030, we will enter Solar Cycle 26, which is predicted to be a “Grand Solar Minimum“, leading to a major drop-off in global temperatures, potentially up-ending agricultural cycles around the world. It shouldn’t take a degree in Sociology or Psychology to see the levels of potential unrest that would result.
  • Then, at the end of 2032, there is the possibility of Asteroid 2024 YR4 impacting the Moon. While this probability is low – currently (mid-2025) standing at 4.3% – it is not zero. This matters, because such a Lunar impact would spew out a debris cloud that would pulverize most of the satellites in Low Earth Orbit, zeroing out payment processing, along with internet and cell service, for months at least…and virtually no store north of the Rio Grande is capable of ringing customers out using cash only…But don’t trust me – ask your local grocery store manager.
  • Then, there is the possibility of the Campi Flegrei supervolcano in Italy ‘waking up’. In addition to vaporizing the major world city of Naples, this could easily generate conditions similar to those that followed the eruption of Tambora, in 1815, which caused the “Year Without A Summer” in 1816, leading to the last great food subsistence crisis in North America.
  • And finally, there are the much-ballyhooed Iranian “sleeper cells” that Washington media Chicken-Littles are so terrified of, in the aftermath of President Donald Trump’s recent attacks on Iran’s nuclear program sites…However, refer to that “known threat” from above: the potential is certainly there, although the lack of action as of this writing tends to indicate that this threat is likely much overblown.

On balance, though, it is clear that right after the scheduled completion of the M60 contract, there are some potentially highly serious problems that could well actually require a “martial law” declaration, which, in turn would require the rapid mobilization of a Citizen militia force.

The signs are that the United States Government – or at least, entities =within= the government – have either known or strongly suspected that “something” was coming for at least two decades, and are worried enough about it, that they have now made an unprecedented public move to pre-position at least some of the tools necessary to make possible mitigation strategies work, tools that the people-at-large cannot realistically obtain on their own.

Whatever is going on, you – the Reader – need to stay ahead of the curve. If you are not sure what kind of preparations you need to take, you need to take action now to find out, and assess your situation…because, Militia or not, when everything goes sideways…

You are on your own.

 

 

 

The Freedomist — Keeping Watch, So You Don’t Have To

 

War Economics in the Shadows

 

 

 



 

Wars require money, in some form. Combatants have to buy weapons, ammunition, food, vehicles, fuel, spare parts, lay down bribes for intelligence and suborning various people, and medical supplies, along with just simple tools…and that’s before we talk about whether they actually pay their fightersd.

In the shadowy realm of contemporary warfare, the most destructive conflicts are increasingly those where the combatants get their war chests filled by distant, foreign capitals. From Ukraine’s defense against Russian aggression to Yemen’s devastating civil war, proxy conflicts have become the preferred method of great power competition — offering what military strategists euphemistically callquick, relatively cheap and low-risk options for the continuation of policy aims“.

Proxy warfare has evolved from Cold War-era confrontations into a sophisticated financial enterprise that operates through complex networks of state sponsors, shell companies, and illicit economic activities. As Foreign Policy columnist Emma Ashford observed, proxy wars have become a preferred method of great power competition, allowing major powers to exert influence while maintaining plausible deniability. Understanding the financial mechanisms that sustain these conflicts is crucial for comprehending modern geopolitical dynamics and developing effective countermeasures.

Yet behind every proxy war lies a complex economic ecosystem that determines not just who fights, but how long they can sustain the violence. Understanding these financial networks reveals uncomfortable truths about modern warfare: conflicts are increasingly about economic endurance rather than battlefield tactics, and the nations writing the checks often have more control over outcomes than the soldiers pulling triggers.

 

The State Funding Model: Direct Government Support

The most straightforward financing mechanism involves direct state funding of proxy forces. President Vladimir Putin’s extraordinary admission in June 2023 revealed that “the financing of the entire Wagner group was fully ensured by the State,” with the Russian Defense Ministry pouring nearly $1 billion into Wagner operations from May 2022 to May 2023. This disclosure shattered decades of Kremlin denials and provided unprecedented insight into how major powers fund their proxy operations.

No nation has perfected the economics of proxy warfare quite like Iran. Tehran’s “Axis of Resistance” represents perhaps history’s most sophisticated proxy financing operation, with the Islamic Revolutionary Guard Corps-Quds Force managing an estimated budget exceeding $1 billion annually for terrorist financing. This staggering sum supports between 140,000 and 185,000 proxy fighters across Afghanistan, Gaza, Lebanon, Pakistan, Syria, and Yemen.

Groups that are part of the “Axis of Resistance”. 2024 image via Kaliper1. CCA/2.5

Iran represents perhaps the most systematic state-sponsored proxy financing network. The U.S. State Department estimated that Iran spent more than $16 billion supporting the Assad regime and its proxies between 2012 and 2020. In 2020 alone, Iran funneled more than $700 million to Hezbollah, while providing more than $100 million annually to Hamas and Palestinian Islamic Jihad. These massive transfers occur through Iran’s Islamic Revolutionary Guard Corps-Quds Force (IRGC-QF), which serves as Tehran’s primary mechanism for financing proxy operations across the Middle East.

The scale of Iran’s investment becomes clear when examining individual recipients. Hezbollah alone receives more than $700 million annually from Tehran, a sum that dwarfs the entire defense budgets of many small nations. As Hezbollah Secretary General Hassan Nasrallah candidly admitted in 2016: “Hezbollah’s budget, everything it eats and drinks, its weapons and rockets, comes from the Islamic Republic of Iran.

Iran’s proxy economics operate on multiple levels simultaneously. Beyond direct cash transfers, Tehran provides weapons manufacturing capabilities, enabling proxies to achieve self-sufficiency while maintaining plausible deniability. In Syria, Iran helped organize, train, and fund over 100,000 Shia fighters, demonstrating how proxy economics can scale to conventional warfare levels when strategic interests demand it.

The sophistication of Iran’s financial network became apparent in 2016 when Hezbollah leader Hassan Nasrallah publicly announced that “all of his organization’s funding comes directly from Iran,” emphasizing that “the budget of Hizbullah, its salaries, its expenses, its food, its drink, its weapons, and its missiles come from the Islamic Republic of Iran“. This funding bypasses traditional banking systems, with Nasrallah confirming that transfers occur directly, “not through banks and other financial institutions”.

The Iranian model reveals a crucial economic principle: proxy wars succeed when sponsors can provide “stable and ample funding” while maintaining political control over their assets. Tehran achieves this through what former CIA analyst Norman Roule describes as controlling “their weaponry, their funding and significant political relationships with their key leaders”.

 

Economic Integration and Development Funding

China has pioneered a more sophisticated approach through its Belt and Road Initiative (BRI), which launched in 2013 with the Silk Road Fund’s $40 billion initial capital. While ostensibly focused on infrastructure development, analysts worry that the BRI could be a Trojan horse for China-led regional development and military expansion. The program’s dual-use potential becomes apparent through [debt-trap diplomacy, where China allegedly uses unsustainable loans to gain leverage over debtor governments.

A 2021 study analyzed over one hundred debt financing contracts China signed with foreign governments and found that the contracts often contain clauses that restrict restructuring with the Paris Club, providing Beijing with significant leverage over partner nations. This economic influence can be converted into military access, as demonstrated by China’s naval base in Djibouti, which many observers see as the first of many potential military expansions.

 

The Technology Transfer Economy

Modern proxy warfare increasingly revolves around technology transfer rather than simple arms sales. The Iran-North Korea weapons pipeline exemplifies this evolution, with both nations sharing ballistic missile technology, submarine designs, and nuclear expertise. Iran’s Shahab-3 missile closely resembles North Korea’s Hawasong-14, while satellite imagery suggests Iranian technical expertise contributed to North Korean missile silo construction.

This technological cooperation creates self-sustaining proxy economies. Rather than remaining dependent on foreign suppliers, proxies gradually develop indigenous capabilities. Iran has mastered this approach, transferring not just weapons but “the means of production and modification to enable independent manufacturing” to its proxy network.

The economic advantages are compelling. Technology transfer builds redundancy of supply, reduces shipping risks, enhances deniability, and creates local employment that strengthens proxy loyalty. For sponsors, it represents a long-term investment strategy that pays dividends far beyond any single conflict.

 

The Ukrainian Counter-Model: Coalition Economics

Ukraine’s defense against Russian invasion illustrates a different proxy economic model—multilateral coalition funding. Rather than relying on a single sponsor, Ukraine has assembled a diverse funding coalition including the United States, European Union, individual NATO members, and unexpected participants like Japan and South Korea.

This approach offers both advantages and vulnerabilities. Coalition funding can provide massive resource flows — U.S. assistance alone has exceeded $350 billion according to various estimates. However, it also creates dependency on multiple political systems with different priorities and election cycles. As U.S. support becomes uncertain under changing administrations, the sustainability of coalition-funded proxy warfare faces its ultimate test.

Japan and South Korea’s involvement demonstrates how proxy economics extend beyond traditional security partnerships. Both nations provide substantial non-lethal aid while “replenishing U.S. weapons stocks, supplying the United States with artillery shells and thereby freeing up Washington’s ability to send shells to Ukraine.” This creates layered economic relationships where allies subsidize great power proxy warfare indirectly.

 

The Russian Adaptation: Sanctions and Substitution

Russia’s proxy economic strategy has evolved dramatically under international sanctions pressure. Traditional funding mechanisms disrupted, Moscow has increasingly relied on partnerships with China, Iran, and North Korea to sustain both its direct war effort and proxy relationships. China provides crucial economic support that enables Russia to withstand Western sanctions, while Iran supplies drones and North Korea provides ammunition and even troops.

This adaptation reveals how proxy economics adjust to pressure. When conventional funding channels close, sponsors develop alternative networks. Russia’s use of Wagner Group mercenaries represented an attempt to privatize proxy relationships, creating plausible deniability while maintaining operational control. The Wagner model failed primarily due to political rather than economic factors, but its brief success demonstrated the potential for corporate proxy structures.

 

Escalation Economics

Perhaps most concerning is how proxy war economics influence conflict escalation. Traditional deterrence theory assumes rational actors will avoid escalation due to increasing costs. However, proxy warfare inverts this logic. As former CIA analyst Norman Roule observes, Iran operates as “an arsonist that then subcontracts out to other arsonists”, empowering proxies with resources while maintaining strategic distance.

This creates moral hazard problems where proxies may escalate beyond their sponsor’s intentions, confident that economic support will continue. The October 7, 2023 Hamas attack on Israel exemplifies this dynamic—Iran provided the economic foundation enabling Hamas capability, but the timing and scale caught Tehran off-guard, demonstrating how proxy economics can enable conflicts that spiral beyond original parameters.

 

Resource Extraction and Illicit Trade

Proxy groups increasingly finance their operations through control of natural resources and illicit trade networks. The U.S. Treasury Department revealed in 2023 that Wagner Group entities in the Central African Republic, United Arab Emirates, and Russia engaged in illicit gold dealings to fund Wagner operations. These operations involve sophisticated shell company networks, with Wagner using companies like Midas and Diamville to convert CAR-origin gold into U.S. dollars.

The U.S. Treasury Department exposed a convoluted Iranian illicit financing scheme in 2018 where Hezbollah officials, working with Iranian operatives and Russian companies, facilitated shipment of millions of barrels of Iranian oil to the Assad regime. The Assad regime would then transfer hundreds of millions of U.S. dollars to the IRGC-QF, which distributed funds to Hamas and Hezbollah. In one documented transaction, a Hezbollah official confirmed receipt of $63 million as part of this oil-for-terror scheme.

 

The Sustainability Question

Ultimately, proxy war economics succeed or fail based on sustainability. Iran’s model works because oil revenues provide consistent funding streams relatively insulated from international pressure. Coalition models like Ukraine’s support depend on sustained political will across multiple democracies—a more fragile foundation.

The economic lessons are clear: modern conflicts are won by whichever side can maintain funding longest, not necessarily whichever side fights best. This reality transforms strategy from tactical to economic, making treasury departments as important as defense ministries in determining conflict outcomes. As proxy wars become the dominant form of great power competition, understanding their economic foundations becomes essential for anticipating tomorrow’s conflicts—and their likely victors.

 

Private Sector and Diaspora Financing

Proxy organizations also tap into private funding sources and diaspora communities. Hezbollah has relied on funding from the Shi’ite Lebanese Diaspora in West Africa, the United States, and the Triple Frontier region along the junction of Paraguay, Argentina, and Brazil. These networks often operate through legitimate businesses and charities that serve as fronts for money laundering operations.

The United States has sanctioned numerous charities and front companies for providing financial support to proxy groups, including the Holy Land Foundation, which was designated in 2001 for providing millions of dollars annually to Hamas. These sanctions have had limited effectiveness, as current U.S. sanctions have not significantly impacted Iran’s relationships with its proxies.

 

Banking and Financial System Exploitation

Modern proxy financing relies heavily on exploiting legitimate financial institutions. A C4ADS report on leaked Wagner documents showed that without legitimate financial institutions such as JP Morgan Chase and HSBC as intermediaries, the Wagner Group would not have been able to establish a foothold in Africa. In 2017, the Sudanese Mining company Meroe Gold, acting as a shell company for Wagner, used JP Morgan Chase to process payments to sellers in China.

Iran has developed sophisticated methods to circumvent banking sanctions. The U.S. designated Bank Saderat in 2006 for facilitating transfers of hundreds of millions of dollars annually to Hezbollah, Hamas, and Palestinian Islamic Jihad. However, new financial networks continuously emerge to replace sanctioned institutions.

 

Government-to-Government Contracts

Some proxy financing occurs through legitimate government contracts that provide plausible cover for military support. Putin revealed that Wagner received contracts worth billions of rubles, including payments from governments who hired Wagner services, such as the Malian government, which reportedly paid Wagner more than $10 million each month. These arrangements allow both parties to maintain the fiction that the services being provided are purely commercial rather than military.

 

A Brave, New World

The financing of proxy warfare presents significant challenges for international security and governance. As noted by RAND Corporation analysts, geopolitical drivers of proxy warfare can often be self-reinforcing, with states able to develop proxy warfare capabilities very quickly, within a couple of years. The financial networks supporting these capabilities are equally adaptable, evolving new methods to circumvent sanctions and detection.

Recent developments suggest that proxy warfare financing will continue to evolve with the global financial system. Cryptocurrency, digital payment systems, and new forms of economic integration provide both opportunities and challenges for states seeking to fund proxy operations while maintaining deniability.

The complexity of modern proxy war financing reflects the broader evolution of international conflict, where economic warfare, information operations, and traditional military action converge in ways that challenge conventional approaches to conflict resolution and accountability. Understanding these financial mechanisms is essential for policymakers seeking to address the root causes of contemporary global instability.

…Money makes the world go ’round – it also helps to burn it.

 

 

 

 

 

 

The Freedomist — Keeping Watch, So You Don’t Have To

 

Operation Gladio: NATO’s Secret Army and the Cold War’s Hidden Front

 

 

 

 



In the shadowy world of Cold War espionage, few programs were as extensive — or as controversial — as Operation Gladio, NATO’s clandestine network of “stay-behind” forces designed to wage guerrilla warfare in the event of a Soviet invasion of Western Europe. What began as a reasonable defensive precaution evolved into a decades-long covert operation that would eventually raise profound questions about democratic oversight, government accountability, and the thin line between national security and state-sponsored terrorism.

Origins in Wartime Necessity

The concept of stay-behind forces emerged from the bitter lessons of World War II, when resistance movements across Nazi-occupied Europe demonstrated both the potential and the limitations of guerrilla warfare against occupying forces. As the Iron Curtain descended across Europe in the late 1940s, Western intelligence services faced a stark reality: the Red Army’s overwhelming conventional superiority meant that any Soviet invasion would likely overrun Western Europe’s conventional defenses within days.

Soviet tanks near Odessa, April 1944. Red Army, USSR, photo. Public Domain.

The solution, conceived jointly by the CIA and Britain’s MI6, was elegantly simple in theory: pre-position trained personnel, weapons caches, and communication equipment throughout Western Europe to serve as the nucleus of resistance movements should the worst occur. These stay-behind units would conduct sabotage operations, gather intelligence, and coordinate with NATO forces attempting to liberate occupied territory.

The formal structure began with the Western Union’s Clandestine Committee (WUCC) in 1948, which was subsequently integrated into NATO as the Clandestine Planning Committee (CPC) in 1951. By 1958, NATO had established the Allied Clandestine Committee (ACC) to coordinate secret warfare operations across member nations.

Named after the double-edged gladius sword of Roman legionaries, Operation Gladio was officially established in 1956, though its roots stretched back to the immediate postwar period. The program’s existence was kept secret not only from the Soviet Union but from most Western European populations and even many of their elected officials.

The Network Expands

What made Gladio unique was its scope and sophistication. Unlike ad hoc resistance movements that formed spontaneously during wartime, these were professionally organized networks with carefully selected personnel, standardized equipment, and regular training exercises. Each participating NATO country maintained its own stay-behind organization: Gladio in Italy, Absalon in Denmark, P26 in Switzerland, ROC in Norway, I&O in the Netherlands, SDRA8 in Belgium, and similar networks in Germany, France, Austria, Greece, and Turkey.

The typical Gladio cell consisted of 10-15 individuals, often recruited from military special forces, intelligence services, or civilian volunteers with particular skills—radio operators, demolitions experts, former resistance fighters. These operatives underwent intensive training in sabotage techniques, covert communications, and survival skills, often at secret facilities in NATO countries or neutral territories.

Weapons caches were carefully concealed throughout the countryside—buried in forests, hidden in caves, stored in seemingly abandoned buildings, and secured in underground bunkers scattered across mountain locations. The arsenal was impressive and comprehensive: automatic weapons, explosives, pistols, ammunition, knives, navigation equipment, spy radios, guerrilla warfare manuals, specialized assassination weapons, and emergency supplies including brandy and chocolate. Cache discoveries as late as 1996 revealed the true scope of the program. In Italy alone, investigators discovered 622 hidden weapons dumps containing everything from machine guns to anti-tank rockets, demonstrating the massive scale of NATO’s secret preparations.

American officer and French partisan crouch behind an auto during a street fight in a French city, 1944. US Army photo. Public Domain.

According to former CIA Director William Colby, who oversaw Scandinavian operations, these networks required careful coordination with NATO planning, radio communications linked to potential government-in-exile locations, and specialized equipment secured from the CIA. The operation extended beyond traditional NATO boundaries, with CIA support for anti-communist movements in Ukraine and covert operations in the Baltic countries.

The Strategy Behind the Shadows

From a strategic perspective, Gladio represented a form of deterrence through promised resistance. Soviet military planners would have to factor in not just the immediate costs of conquering Western Europe, but the ongoing expense of occupying territories where trained guerrillas could strike at supply lines, assassination key collaborators, and gather intelligence for NATO counterattacks.

This strategy drew heavily from successful resistance operations during World War II, particularly the French Resistance and Yugoslav partisans, while attempting to avoid their primary weaknesses: poor coordination with Allied forces, inadequate equipment, and security vulnerabilities that led to mass arrests.

The program also served intelligence-gathering functions during peacetime. Stay-behind operatives were positioned to monitor communist activities, track potential collaborators, and maintain surveillance on strategic targets. This dual-purpose nature would later prove controversial when allegations emerged that some units engaged in domestic political surveillance beyond their official mandate.

The Italian Revelation and Gladio Exposed

The existence of these networks remained one of the Cold War’s most closely guarded secrets until 1990, when Italian Prime Minister Giulio Andreotti revealed the existence of Gladio to the Italian Senate. His disclosure was prompted by the discovery of a 1959 document from Italy’s military intelligence service SIFAR, titled “The special forces of SIFAR and Operation Gladio,” which detailed the secret army’s NATO connections and CIA training.

Andreotti’s revelation described Gladio as “the Italian branch of an international network of secret stay-behind armies that existed in all countries of Western Europe.” The Italian press called it “the best kept, and most damaging, political-military secret since World War II”.

The Strategy of Tension Controversy

The most controversial aspect of Operation Gladio involves allegations that stay-behind networks became entangled with domestic terrorism during Italy’s “Years of Lead” (1968-1982). This period saw over 14,000 politically motivated attacks, including bombings, assassinations, and kidnappings by both far-left groups like the Red Brigades and far-right organizations such as Ordine Nuovo.

Critics, particularly Swiss academic Daniele Ganser, argue that Gladio networks participated in a “strategy of tension” designed to prevent communist parties from gaining power by conducting false flag operations that could be blamed on left-wing groups. Key incidents cited include the 1969 Piazza Fontana bombing in Milan, which killed 17 people, and the 1980 Bologna railway station bombing that killed 85.

The interior of the Banca Nazionale dell’Agricoltura in Piazza Fontana, Milan, after it was bombed in 1969. RAI photo. Public Domain.

The strategy of tension theory suggests that right-wing terrorism was designed to create public fear and drive voters toward authoritarian solutions. As Italian Prime Minister Francesco Cossiga observed about the Bologna bombing: “Unlike leftist terrorism, which strikes at the heart of the state through its representatives, right-wing terrorism prefers acts such as massacres because acts of extreme violence promote panic and impulsive reactions”.

International Response and Investigations

Following Gladio’s exposure, the European Parliament passed a resolution on November 22, 1990, condemning “the clandestine creation of manipulative and operational networks” and calling for full investigation into these secret organizations. The resolution specifically protested “the assumption by certain US military personnel at SHAPE and in NATO of the right to encourage the establishment in Europe of a clandestine intelligence and operation network”.

However, only Italy, Belgium, and Switzerland conducted parliamentary investigations into their respective networks. The George H.W. Bush administration refused to comment on the revelations, maintaining official silence about U.S. involvement.

Global Implications

While Gladio focused on Europe, the United States simultaneously developed similar programs worldwide. In Asia, the CIA created stay-behind networks in countries like South Korea, Taiwan, and the Philippines. In Latin America, comparable programs supported anti-communist forces throughout the region.

These operations reflected a fundamental Cold War reality: the nuclear stalemate meant that much of the actual conflict would be fought through proxies, covert operations, and what would later be termed “hybrid warfare.” Stay-behind networks represented the defensive complement to more aggressive covert operations like the Bay of Pigs invasion or support for Afghan mujahideen.

The philosophical underpinning was straightforward: democratic governments had not just the right but the obligation to prepare for scenarios where normal constitutional processes might be suspended by foreign occupation. The question that would later haunt these programs was whether such extraordinary measures could be contained within democratic norms during peacetime, or whether they inevitably created parallel power structures accountable to no one.

The legacy of Operation Gladio continues to influence contemporary debates about government surveillance, covert operations, and the balance between security and transparency in democratic societies.

The Historical Debate

The true nature and extent of Gladio’s activities remain subjects of intense historical debate. The U.S. State Department has acknowledged the existence of NATO stay-behind efforts and Italy’s Gladio specifically, confirming their purpose as resistance preparation against potential Soviet aggression. However, American officials firmly deny any U.S. involvement in terrorism, characterizing allegations of false flag operations as Cold War-era Soviet disinformation.

Critics of the conspiracy theories point to the reliance on questionable documents, particularly the alleged U.S. Army Field Manual 30-31B, which the State Department claims is a Soviet forgery designed to discredit American intelligence operations.

Legacy and Contemporary Relevance

Operation Gladio’s legacy extends far beyond its Cold War origins. The revelations fundamentally altered public understanding of post-war European history, demonstrating how deeply intelligence operations could penetrate democratic societies. The networks were never called upon to resist Soviet invasion, as the threat they were designed to counter ultimately never materialized.

The operation raises enduring questions about the balance between national security and democratic oversight, the accountability of intelligence agencies, and the potential for covert operations to exceed their original mandates. Whether Gladio remained purely a defensive contingency or evolved into something more sinister continues to divide historians and fuel conspiracy theories decades after its exposure.

What remains undisputed is that NATO and Western intelligence agencies maintained extensive secret networks throughout the Cold War, equipped with weapons and trained in unconventional warfare, operating largely outside democratic oversight. The full truth about their activities may never be completely known, ensuring that Operation Gladio remains one of the Cold War’s most intriguing and controversial legacies.

…The real question is: Are these networks still out there, on their own?

 

 

 

The Freedomist — Keeping Watch, So You Don’t Have To

 

 

Main

Back FREEDOM for only $4.95/month and help the Freedomist to fight the ongoing war on liberty and defeat the establishment's SHILL press!!

Are you enjoying our content? Help support our mission to reach every American with a message of freedom through virtue, liberty, and independence! Support our team of dedicated freedom builders for as little as $4.95/month! Back the Freedomist now! Click here